[Docs] [txt|pdf] [Tracker] [WG] [Email] [Diff1] [Diff2] [Nits] [IPR]

Versions: (draft-lendl-enum-validation-token) 00 01 02 03 04 RFC 5105

ENUM -- Telephone Number Mapping                                O. Lendl
Working Group                                                    enum.at
Internet-Draft                                         February 22, 2006
Expires: August 26, 2006

                ENUM Validation Token Format Definition

Status of this Memo

   By submitting this Internet-Draft, each author represents that any
   applicable patent or other IPR claims of which he or she is aware
   have been or will be disclosed, and any of which he or she becomes
   aware will be disclosed, in accordance with Section 6 of BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at

   The list of Internet-Draft Shadow Directories can be accessed at

   This Internet-Draft will expire on August 26, 2006.

Copyright Notice

   Copyright (C) The Internet Society (2006).


   An ENUM domain name is tightly coupled with the underlying E.164
   number.  The process of verifying whether the Registrant of an ENUM
   domain name is identical to the Assignee of the corresponding E.164
   number is commonly called "validation".  This document describes an
   signed XML data format -- the Validation Token -- with which
   Validation Entities can convey successful completion of a validation
   procedure in a secure fashion.

Lendl                    Expires August 26, 2006                [Page 1]

Internet-Draft            ENUM Validation Token            February 2006

Table of Contents

   1.   Introduction . . . . . . . . . . . . . . . . . . . . . . . .   3

   2.   Data Requirements  . . . . . . . . . . . . . . . . . . . . .   3

   3.   Digital Signature  . . . . . . . . . . . . . . . . . . . . .   3

   4.   Field Descriptions . . . . . . . . . . . . . . . . . . . . .   4
     4.1  Mandatory Section  . . . . . . . . . . . . . . . . . . . .   4
     4.2  Optional Section . . . . . . . . . . . . . . . . . . . . .   5

   5.   Examples . . . . . . . . . . . . . . . . . . . . . . . . . .   5
     5.1  Unsigned Token without Registrant Information  . . . . . .   5
     5.2  Signed token . . . . . . . . . . . . . . . . . . . . . . .   6

   6.   Formal Syntax  . . . . . . . . . . . . . . . . . . . . . . .   8
     6.1  Token Core Schema  . . . . . . . . . . . . . . . . . . . .   8
     6.2  Token Data Schema  . . . . . . . . . . . . . . . . . . . .  10

   7.   Other applications of the Token concept  . . . . . . . . . .  12

   8.   IANA Considerations  . . . . . . . . . . . . . . . . . . . .  12

   9.   Security Considerations  . . . . . . . . . . . . . . . . . .  13

   10.  Acknowledgements . . . . . . . . . . . . . . . . . . . . . .  13

   11.  References . . . . . . . . . . . . . . . . . . . . . . . . .  14
     11.1   Normative References . . . . . . . . . . . . . . . . . .  14
     11.2   Informative References . . . . . . . . . . . . . . . . .  14

        Author's Address . . . . . . . . . . . . . . . . . . . . . .  15

        Intellectual Property and Copyright Statements . . . . . . .  16

Lendl                    Expires August 26, 2006                [Page 2]

Internet-Draft            ENUM Validation Token            February 2006

1.  Introduction

   In the case where an ENUM (E.164 Number Mapping [1]) domain name
   corresponds to an existing E.164 number [2] the delegation of this
   domain needs to be authorized by the Assignee of the corresponding
   E.164 number.  In the role model described in [11] the entity which
   performs this check is called the Validation Entity (VE).

   By conveying an ENUM Validation Token - a signed XML document - to
   the Registry a VE certifies that delegation requirements have been
   met and are current.

2.  Data Requirements

   In this model, the Token is the only piece of data passed from the VE
   to the Registry.  Therefore, the Token needs to contain as least as
   much information as the Registry requires to grant the delegation of
   the requested ENUM domain according to its registration policy.  As
   such, the Registry will need confirmation that
   o  the Token was created by an accredited VE,
   o  the Token's duration of validity conforms to the policy,
   o  the validation procedure employed has met minimum requirements as
      set forth by policy,
   o  and that the Token is protected against tampering and replay

   Beyond such mandatory information, the Token may optionally include
   number holder information, in particular to simplify future re-

   For example, if initial validation requires the steps "Check the
   identity of the Registrant" and "Check the ownership of an E.164
   number" then a later revalidation only needs to re-check the
   ownership as the identity of the Registrant does not change.

   As the Token will be included (see e.g. [12]) in XML-based Registry/
   Registrar protocols like the Extensible Provisioning Protocol (EPP)
   [9] it is a natural choice to use XML to encode Validation Tokens.

3.  Digital Signature

   According to the architecture model the propriety of an ENUM
   delegation depends on the trust relationship between the Registry and
   the VE.  For generality, an untrusted link between Registry and VE
   should be assumed (for instance the Token is passed along with the
   registration request by a Registrar, who might have no role in
   asserting the right-to-use).  Therefore, the Token must be protected
   against forgery, tampering and replay-attacks.

Lendl                    Expires August 26, 2006                [Page 3]

Internet-Draft            ENUM Validation Token            February 2006

   A digital signature on the token
   o  asserts that the token was indeed generated by the indicated VE
   o  guarantees that the token was not tampered with in transit
   o  enables auditing the validation process (non-repudiation).

   The cryptographic signature on the token follows RFC 3275 (XML-DSIG
   [3]).  As tokens might be transmitted as part of an already XML based
   protocol the exclusive XML canonicalization [7] is used.  This
   transform guarantees that namespace declarations inherited from the
   surrounding XML do not invalidate the signature.  In order to make
   the signature an integral part of the token the "enveloped"-signature
   mode is employed.  The signature covers all information contained in
   the Token.

   While XML-DSIG offers a number of cryptographic algorithms, local
   policy should define which algorithms will be accepted by the
   Registry.  It is suggested to use the RSA-SHA1 algorithm with
   embedded X.509 [8] certificates.

   The choice of RSA-SHA1 does not require a public key infrastructure.
   Whether the Registry acts as a certificate authority, accepts certs
   from a public Certification Authority, or only accepts pre-registered
   keys is a local policy choice.

4.  Field Descriptions

4.1  Mandatory Section

   A token must contain a <validation> element which contains the
   o  A single validation "serial" attribute identifying a validation
      token for a certain VE.  It must be unique per VE.
   o  A single <E164Number> element containing the underlying E.164
      number in fully qualified (international) format.
   o  An optional <lastE164Number> element.  If present it indicates
      that the whole number block starting with <E164Number> up to and
      including <lastE164Number> has been validated.  To avoid
      ambiguity, both numbers must be of the same length.
   o  A single <validationEntityID> element identifying the VE.
   o  A single <registrarID> element identifying the Registrar on whose
      behalf the validation was performed.
   o  A single <methodID> element identifying the method used by the VE
      for validation.
   o  A single <executionDate> attribute containing the date of
      validation formatted as "full-date" according to RFC 3339 [4].

Lendl                    Expires August 26, 2006                [Page 4]

Internet-Draft            ENUM Validation Token            February 2006

   o  An optional <expirationDate> attribute marking the expiration date
      of the validation token formatted as "full-date" according to RFC
      3339.  The Registry will automatically revoke the delegation at
      this date unless a new Token has been submitted that extends the
      lifetime of the validation.  A missing expirationDate indicates
      infinite validity of the Token.

   The format and the uniqueness-constraints of these IDs is left to the
   local policy of the Registry.

4.2  Optional Section

   A token may contain a <tokendata> section containing information
   about the number holder, consisting of the the following elements:
   o  A single <organization> element containing the full name of the
      organization to which the Registrant is affiliated.
   o  A single <commercialregisternumber> element.  If the Registrant is
      a company, then this field can be used to uniquely identify that
      company by its official registration number.  The interpretation
      of this field is country-specific.
   o  A single <title> element
   o  A single <firstname> element
   o  A single <lastname> element
   o  A single <address> section containing the following elements:
      *  A single optional <streetName>
      *  A single optional <houseNumber>
      *  A single optional <postalCode>
      *  A single optional <locality>
      *  A single optional <countyStateOrProvince>
      *  A single optional <ISOcountryCode>
   o  up to 10 <phone> elements containing full E.164 numbers
   o  up to 10 <fax> elements containing full E.164 numbers
   o  up to 10 <email> elements

   All elements directly under <tokendata> are optional.  The first five
   elements within the <address> element conform to the second version
   of the E.115 Computerized Directory Assistance [14].  The
   <ISOcountryCode> element specifies the country using the ISO 3166
   [13] code.

5.  Examples

5.1  Unsigned Token without Registrant Information

   This basic Token without any information about the Registrant and
   without the cryptographic signature shows the basic layout of the
   mandatory elements.

Lendl                    Expires August 26, 2006                [Page 5]

Internet-Draft            ENUM Validation Token            February 2006

   <?xml version="1.0" encoding="utf-8" standalone="no" ?>
   <token xmlns="urn:ietf:params:xml:ns:enum-token-1.0" Id="TOKEN"
     "urn:ietf:params:xml:ns:enum-token-1.0 enum-token-1.0.xsd">
     <validation serial="acmeve-000002">

5.2  Signed token

   This example uses an X.509 based signature which includes the
   certificate of the signing validation entity.  Thus the validity of
   the signature can be verified without the need for a key-server.  A
   valid signature is a necessary, but not sufficient condition for a
   valid Token.  Any entity evaluating a Token needs to check other
   factors as well, e.g. the certificate and the XML schema.

   <?xml version="1.0" encoding="utf-8" standalone="no" ?>
   <token xmlns="urn:ietf:params:xml:ns:enum-token-1.0" Id="TOKEN"
    "urn:ietf:params:xml:ns:enum-token-1.0 enum-token-1.0.xsd">
     <validation serial="acmeve-000001">
     <tokendata xmlns="urn:ietf:params:xml:ns:enum-tokendata-1.0"
     "urn:ietf:params:xml:ns:enum-tokendata-1.0 enum-tokendata-1.0.xsd">
         <organisation>Example GmbH</organisation>

Lendl                    Expires August 26, 2006                [Page 6]

Internet-Draft            ENUM Validation Token            February 2006

     <Signature xmlns="http://www.w3.org/2000/09/xmldsig#">
         <Reference URI="#TOKEN">
             <Transform Algorithm=
             <Transform Algorithm=
               <InclusiveNamespaces xmlns=
                PrefixList="enum-token enum-tokendata"/>
           <DigestMethod Algorithm=

Lendl                    Expires August 26, 2006                [Page 7]

Internet-Draft            ENUM Validation Token            February 2006


6.  Formal Syntax

   The formal syntax of the validation token is specified using XML
   schema notation [5] [6].  Two schemas are defined: The "token core
   schema" contains mandatory attribute definitions, the "token data
   schema" defines the format of the optional "tokendata" section.  The
   BEGIN and END tags are not part of the schema; they are used to note
   the beginning and ending of the schema for URI registration purposes.

6.1  Token Core Schema

   <?xml version="1.0" encoding="UTF-8"?>

   <schema targetNamespace="urn:ietf:params:xml:ns:enum-token-1.0"

   <!--  Import common element types.  -->

     <import namespace="http://www.w3.org/2000/09/xmldsig#"

Lendl                    Expires August 26, 2006                [Page 8]

Internet-Draft            ENUM Validation Token            February 2006

     <import namespace="urn:ietf:params:xml:ns:enum-tokendata-1.0"

         enum.at Validation Token core schema

     <element name="token" type="enum-token:tokenBaseType"/>

     <simpleType name="shortTokenType">
       <restriction base="token">
         <minLength value="1"/>
         <maxLength value="20"/>

     <simpleType name="e164numberType">
       <restriction base="token">
         <maxLength value="20"/>
         <pattern value="\+\d\d*"/>

     <complexType name="validationDataType">
         <element name="E164Number"
         <element name="lastE164Number" minOccurs="0"
         <element name="validationEntityID"
         <element name="registrarID"
         <element name="methodID"
         <element name="executionDate" type="date"/>
         <element name="expirationDate"
                         type="date" minOccurs="0"/>
       <attribute name="serial" type="enum-token:shortTokenType"

     <complexType name="tokenBaseType">
         <element name="validation"

Lendl                    Expires August 26, 2006                [Page 9]

Internet-Draft            ENUM Validation Token            February 2006

         <any namespace="urn:ietf:params:xml:ns:enum-tokendata-1.0"
         <any namespace="http://www.w3.org/2000/09/xmldsig#"/>
       <attribute name="Id" type="ID" use="required"/>


6.2  Token Data Schema

   <?xml version="1.0" encoding="UTF-8"?>

   <schema targetNamespace="urn:ietf:params:xml:ns:enum-tokendata-1.0"

     <element name="tokendata" type="enum-tokendata:tokenDataType"/>

     <simpleType name="E115String">
       <restriction base="string">
    <pattern value="[&#x20;-&#x7A;&#xA0;-&#xD7FF;&#xE000;-&#xFFFD;]*"/>

     <simpleType name="E115StringUb256">
       <restriction base="enum-tokendata:E115String">
         <minLength value="1"/>
         <maxLength value="256"/>

     <simpleType name="countryCodeType">
       <restriction base="token">
         <minLength value="2"/>
         <maxLength value="2"/>

     <simpleType name="TokenType">
       <restriction base="token">
         <minLength value="1"/>
         <maxLength value="64"/>

Lendl                    Expires August 26, 2006               [Page 10]

Internet-Draft            ENUM Validation Token            February 2006


     <complexType name="addressType">
         <element name="streetName"     minOccurs="0"
          type="enum-tokendata:E115StringUb256" />
         <element name="houseNumber"    minOccurs="0"
         <element name="postalCode"     minOccurs="0"
         <element name="locality"       minOccurs="0"
         <element name="countyStateOrProvince" minOccurs="0"
         <element name="ISOcountryCode" minOccurs="0"

     <group name="tokenContactBaseGroup">
         <element name="organisation"  minOccurs="0"
         <element name="commercialregisternumber" minOccurs="0"
         <element name="title"         minOccurs="0"
         <element name="firstname"     minOccurs="0"
         <element name="lastname"      minOccurs="0"
         <element name="address"       minOccurs="0"
         <element name="phone" type="enum-tokendata:TokenType"
          minOccurs="0" maxOccurs="10" />
         <element name="fax"   type="enum-tokendata:TokenType"
          minOccurs="0" maxOccurs="10" />
         <element name="email" type="enum-tokendata:TokenType"
          minOccurs="0" maxOccurs="10" />

     <complexType name="contactType">
         <group ref="enum-tokendata:tokenContactBaseGroup"/>

Lendl                    Expires August 26, 2006               [Page 11]

Internet-Draft            ENUM Validation Token            February 2006

     <complexType name="tokenDataType">
         <element name="contact" type="enum-tokendata:contactType"/>



7.  Other applications of the Token concept

   The concept of the validation token may be useful in other registry-
   type applications where the proof of an underlying right is a
   condition for a valid registration.

   An example is a TLD (Top Level Domain) where registration is subject
   to proof of some precondition, like a trade mark or the right in a
   name.  Such situations often arise during the introduction of a new
   TLD, e.g. during a "sunrise" phase.

   A Number Portability (NP) database faces very similar verification
   issues.  An NP system based on the Token concept could potentially be
   superior to current methods, and aid in the convergence of NP and

8.  IANA Considerations

   This document uses URNs to describe XML namespaces and XML schemas
   conforming to a registry mechanism described in RFC 3688 [10].  Four
   URI assignments are requested.
   1.  Registration request for the Token namespace:
       *  URI: urn:ietf:params:xml:ns:enum-token-1.0
       *  Registrant Contact: See the "Author's Address" section of this
       *  XML: None.  Namespace URIs do not represent an XML
   2.  Registration request for the Token XML schema:
       *  URI: urn:ietf:params:xml:schema:enum-token-1.0
       *  Registrant Contact: See the "Author's Address" section of this
       *  XML: See Section 6.1 of this document.
   3.  Registration request for the Token Data namespace:
       *  URI: urn:ietf:params:xml:ns:enum-tokendata-1.0
       *  Registrant Contact: See the "Author's Address" section of this

Lendl                    Expires August 26, 2006               [Page 12]

Internet-Draft            ENUM Validation Token            February 2006

       *  XML: None.  Namespace URIs do not represent an XML
   4.  Registration request for the Token Data XML schema:
       *  URI: urn:ietf:params:xml:schema:enum-tokendata-1.0
       *  Registrant Contact: See the "Author's Address" section of this
       *  XML: See Section 6.2 of this document.

   The IDs used in the validationEntityID, RegistrarID, and methodID
   elements are subject to local policy and thus do not require IANA

9.  Security Considerations

   The security of the Validation Token depends on the security of the
   underlying XML DSIG algorithms.  As such, all the security
   considerations from [3] apply here as well.  Two points from there
   merit repetition:

   Transforms are used to select the relevant data for signing and to
   discard irrelevant information (e.g. pretty-printing and name-space
   local names).

   The <Reference URI="#TOKEN"> element and attribute combined with the
   Id="TOKEN" attribute in <token> specifies that the signature should
   cover the complete token.  Moving the Id="TOKEN" attribute to e.g.
   the <tokendata> element would make the signature worthless.

   It is thus critical that the Registry does not only check whether the
   Token passes a generic XML-DSIG signature check, but also that the
   signature uses approved transforms and references the <token> element
   as well as that the certificate belongs to an accredited VE.

   The Token content is not encrypted.  If local policy dictates that
   the information contained within the token should be protected then
   this has to be handled through a different mechanism.

   When processing a delegation request the Registry must verify that
   the information contained in the Token matches the delegation
   request.  To avert replay attacks, local policy has to specify for
   how long after <executionDate> the Token can be used to authorize a
   delegation.  The <registrarID> element in the Token prevents a
   malicious second Registrar from using an eavesdropped Token to
   register a domain in his name.

10.  Acknowledgements

   The author would like to thank the following persons for their

Lendl                    Expires August 26, 2006               [Page 13]

Internet-Draft            ENUM Validation Token            February 2006

   valuable suggestions and contributions: Michael Haberler, Alexander
   Mayrhofer, Bernie Hoeneisen, Michael Braunoeder, Staffan Hagnell,
   Lawrence Conroy, Tony Rutkowski.

11.  References

11.1  Normative References

   [1]  Faltstrom, P. and M. Mealling, "The E.164 to Uniform Resource
        Identifiers (URI) Dynamic Delegation Discovery System (DDDS)
        Application (ENUM)", RFC 3761, April 2004.

   [2]  ITU-T, "The international public telecommunication numbering
        plan", Recommendation E.164, May 1997.

   [3]  Eastlake, D., Reagle, J., and D. Solo, "(Extensible Markup
        Language) XML-Signature Syntax and Processing", RFC 3275,
        March 2002.

   [4]  Klyne, G. and C. Newman, "Date and Time on the Internet:
        Timestamps", RFC 3339, July 2002.

   [5]  Maloney, M., Beech, D., Mendelsohn, N., and H. Thompson, "XML
        Schema Part 1: Structures", W3C REC REC-xmlschema-1-20010502,
        May 2001.

   [6]  Malhotra, A. and P. Biron, "XML Schema Part 2: Datatypes", W3C
        REC REC-xmlschema-2-20010502, May 2001.

   [7]  3rd, D., Boyer, J., and J. Reagle, "Exclusive XML
        Canonicalization Version 1.0", W3C REC REC-xml-exc-c14n-
        20020718, July 2002.

   [8]  International Telecommunications Union, "Information technology
        - Open Systems Interconnection - The Directory: Public-key and
        attribute certificate frameworks", ITU-T Recommendation X.509,
        ISO Standard 9594-8, March 2000.

11.2  Informative References

   [9]   Hollenbeck, S., "Extensible Provisioning Protocol (EPP)",
         RFC 3730, March 2004.

   [10]  Mealling, M., "The IETF XML Registry", BCP 81, RFC 3688,
         January 2004.

   [11]  Mayrhofer, A. and B. Hoeneisen, "ENUM Validation Architecture",
         draft-ietf-enum-validation-arch-01 (work in progress),

Lendl                    Expires August 26, 2006               [Page 14]

Internet-Draft            ENUM Validation Token            February 2006

         February 2006.

   [12]  Hoeneisen, B., "ENUM Validation Information Mapping for the
         Extensible Provisioning  Protocol",
         draft-ietf-enum-validation-epp-02 (work in progress),
         February 2006.

   [13]  International Organization for Standardization, "Codes for the
         representation of names of countries, 3rd edition",
         ISO Standard 3166, August 1988.

   [14]  ITU-T, "Computerized Directory Assistance Version 2",
         Recommendation E.115v2, October 2005.

Author's Address

   Otmar Lendl
   enum.at GmbH
   Karlsplatz 1/2/9
   Wien  A-1010

   Phone: +43 1 5056416 33
   Email: otmar.lendl@enum.at
   URI:   http://www.enum.at/

Lendl                    Expires August 26, 2006               [Page 15]

Internet-Draft            ENUM Validation Token            February 2006

Intellectual Property Statement

   The IETF takes no position regarding the validity or scope of any
   Intellectual Property Rights or other rights that might be claimed to
   pertain to the implementation or use of the technology described in
   this document or the extent to which any license under such rights
   might or might not be available; nor does it represent that it has
   made any independent effort to identify any such rights.  Information
   on the procedures with respect to rights in RFC documents can be
   found in BCP 78 and BCP 79.

   Copies of IPR disclosures made to the IETF Secretariat and any
   assurances of licenses to be made available, or the result of an
   attempt made to obtain a general license or permission for the use of
   such proprietary rights by implementers or users of this
   specification can be obtained from the IETF on-line IPR repository at

   The IETF invites any interested party to bring to its attention any
   copyrights, patents or patent applications, or other proprietary
   rights that may cover technology that may be required to implement
   this standard.  Please address the information to the IETF at

Disclaimer of Validity

   This document and the information contained herein are provided on an

Copyright Statement

   Copyright (C) The Internet Society (2006).  This document is subject
   to the rights, licenses and restrictions contained in BCP 78, and
   except as set forth therein, the authors retain all their rights.


   Funding for the RFC Editor function is currently provided by the
   Internet Society.

Lendl                    Expires August 26, 2006               [Page 16]

Html markup produced by rfcmarkup 1.113, available from https://tools.ietf.org/tools/rfcmarkup/